Security for Legal SaaS

Episode 21 · Module 5 · Authentication

Multi-Factor Authentication

19 May 2026 · 8:46 · Security for Legal SaaS

8:46 8:46

In Episode 17, we examined how passwords are stored securely using hashing algorithms like bcrypt and Argon2id. But even a perfectly hashed password has a fundamental limitation: it is a single factor. If an attacker obtains a user's password — through phishing, credential stuffing, a breach of another service, or simple guesswork — they have everything they need to impersonate that user. Multi-factor authentication (MFA) addresses this by requiring evidence from two or more independent categories before granting access. Microsoft's analysis of account compromises found that MFA blocks 99.9% of automated attacks on accounts.

Today’s Lesson

Security for Legal SaaS — Episode 21: Multi-Factor Authentication

Why Passwords Alone Are Not Enough

In Episode 17, we examined how passwords are stored securely using hashing algorithms like bcrypt and Argon2id. But even a perfectly hashed password has a fundamental limitation: it is a single factor. If an attacker obtains a user's password — through phishing, credential stuffing, a breach of another service, or simple guesswork — they have everything they need to impersonate that user.

Multi-factor authentication (MFA) addresses this by requiring evidence from two or more independent categories before granting access. Microsoft's analysis of account compromises found that MFA blocks 99.9% of automated attacks on accounts.1 For legal SaaS platforms handling privileged client communications and case strategy, MFA is not optional — it is a baseline professional obligation.

The Three Factor Categories

Authentication factors fall into three categories:

Category Description Examples
Something you know A secret the user has memorised Password, PIN, security question
Something you have A physical object the user possesses Phone (for TOTP codes), hardware security key, smart card
Something you are A biometric characteristic Fingerprint, face scan, iris pattern

True MFA requires factors from at least two different categories. Two passwords are not MFA — they are two instances of the same factor category. A password (something you know) combined with a six-digit code from an authenticator app on your phone (something you have) qualifies because it draws from two independent categories.2

NIST SP 800-63B formalises this through Authenticator Assurance Levels (AALs). AAL1 permits single-factor authentication. AAL2 requires multi-factor authentication — at minimum, a password plus a second factor. AAL3 requires hardware-based cryptographic authenticators, such as FIDO2 security keys.3 Any system handling personally identifiable information must implement at least AAL2.

MFA Methods Compared

Not all second factors provide equal security. The table below ranks common methods from weakest to strongest:

Method Factor Type Phishing Resistant? Strengths Weaknesses
SMS codes Something you have (phone number) No Easy to deploy, familiar to users Vulnerable to SIM swapping, SS7 interception, real-time phishing relays
Email codes Something you have (email account) No No app installation required Depends on email security; phishable; delays in delivery
TOTP apps (Google Authenticator, Authy) Something you have (device with shared secret) No Works offline, no SMS dependency Codes can be phished in real time; shared secret can be extracted from compromised devices
Push notifications (Duo, Microsoft Authenticator) Something you have (registered device) Partial Convenient; harder to phish than codes Vulnerable to MFA fatigue attacks (repeated push spam)
Hardware security keys (YubiKey, Titan) Something you have (physical key) Yes Cryptographically bound to domain; immune to phishing Physical device required; cost per key; loss/replacement logistics
Passkeys / WebAuthn Something you have + something you are Yes Phishing resistant; no shared secret; synced across devices Ecosystem still maturing; platform lock-in concerns
Key stat: NIST SP 800-63B explicitly deprecates SMS as a standalone second factor due to demonstrated vulnerabilities in the telephone network, including SIM swap fraud and SS7 protocol exploitation.4

TOTP: The Current Workhorse

Time-Based One-Time Passwords — TOTP, defined in RFC 6238 — are the most widely deployed MFA method in legal SaaS today.5 During setup, the server generates a shared secret and displays it as a QR code. The user scans it with an authenticator app (Google Authenticator, Authy, 1Password). Every 30 seconds, both the server and the app independently compute a six-digit code from the shared secret combined with the current timestamp. At login, the user enters the current code to prove they possess the device holding the secret.

TOTP is a substantial improvement over passwords alone. It works offline, requires no SMS delivery infrastructure, and is free to implement. But it has limitations:

Push Notifications and MFA Fatigue

Push-based MFA — where the user approves a login attempt by tapping "Approve" on their phone — improves usability over typing codes. But it introduced a new attack vector: MFA fatigue.

Case study: Uber, September 2022. An attacker purchased stolen credentials for an Uber contractor from a dark web marketplace. When MFA push notifications blocked the initial login, the attacker sent over 40 push notifications in 30 minutes to the contractor's phone, then contacted them via WhatsApp pretending to be Uber IT security, telling them to approve the notification to make it stop. The contractor complied. The attacker gained VPN access, found admin credentials in a PowerShell script, and escalated to full administrative control over Uber's cloud infrastructure.7

Mitigations for MFA fatigue include number matching (the user must type a number displayed on the login screen into the push notification, proving they can see both screens), location context (showing the geographic origin of the login attempt), and rate limiting push requests. Microsoft, Okta, and Duo have all added number matching as a default or recommended setting since the Uber incident.8

Passkeys and WebAuthn: The Phishing-Resistant Endgame

WebAuthn, the web standard developed by the W3C and the FIDO Alliance, uses public-key cryptography instead of shared secrets.9 During registration, the authenticator generates a unique key pair. The private key never leaves the device. The public key is sent to the server. During authentication, the server sends a challenge; the authenticator signs it with the private key, and the server verifies the signature against the stored public key.

Critically, WebAuthn binds the credential to the origin (the website's domain). The authenticator checks that the domain requesting authentication matches the domain where the credential was registered. A phishing site at `login-legalplatform.com` cannot trick the authenticator into signing a challenge for `legalplatform.com`. Phishing becomes cryptographically impossible — not just difficult, but mathematically excluded.10

Passkeys are the consumer-friendly evolution of WebAuthn. They sync the private key across devices using platform-specific vaults (iCloud Keychain, Google Password Manager, 1Password). This solves the hardware key's biggest usability problem — loss of a single device no longer means lockout. The tradeoff is that the security now depends on the platform account's protection (which should itself be MFA-protected).11

Regulatory momentum: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) explicitly recommends phishing-resistant MFA based on FIDO2/WebAuthn for all organisations, with special urgency for high-value targets — a category that includes law firms holding litigation strategy and M&A communications.12

Recovery Flows: The Weakest Link

The strongest MFA is only as good as its recovery process. If a user loses their second factor, how do they regain access?

Common recovery mechanisms and their risks:

Recovery Method Risk
SMS-based recovery code Defeats the purpose of hardware keys; vulnerable to SIM swap
Email-based recovery link Security depends on email account protection
Pre-generated backup codes Often stored insecurely by users
Admin manual override Social engineering risk; requires identity verification procedure
Secondary hardware key Strongest option; requires users to register two keys at enrolment

The OWASP Multi-Factor Authentication Cheat Sheet recommends treating factor replacement as a high-risk action requiring reauthentication with an existing enrolled factor, never relying solely on the active session.13 For legal SaaS platforms, the recommended approach is: require users to register at least two independent second factors at enrolment, and verify identity through an out-of-band process (phone call with identity verification, physical office visit) before resetting MFA for users who have lost all factors.

Breaches That MFA Would Have Prevented

Incident Year Root Cause MFA Impact
Colonial Pipeline 2021 Compromised VPN password on dormant account with no MFA Basic MFA on the VPN would have blocked the attack entirely14
Uber 2022 MFA fatigue — push notification spam Phishing-resistant MFA (FIDO2) would have been immune to the social engineering7
Okta (Lapsus$) 2022 Compromised support contractor credentials Hardware key requirement for privileged access would have prevented lateral movement
MGM Resorts 2023 Social engineering of help desk to reset MFA Stronger identity verification in recovery flow would have blocked the reset15

Mandatory MFA for Legal SaaS: Professional Obligation

The ABA's 2023 Legal Technology Survey Report found that fewer than half of solo practitioners and small firms use MFA — despite ABA Model Rule 1.6(c) requiring "reasonable efforts" to prevent unauthorised access to client information.16 Cyber insurance underwriters have responded: as of 2025, most carriers require MFA on all accounts, 24/7 endpoint monitoring, and a written incident response plan as preconditions for coverage.

For legal SaaS vendors, the calculus is straightforward:

  1. Enforce MFA for all users, not just admins. Provide TOTP as the baseline, passkeys as the recommended option.
  2. Offer phishing-resistant MFA (WebAuthn/passkeys) for firms handling high-sensitivity matters — litigation strategy, M&A, government investigations.
  3. Design recovery flows carefully. Never allow SMS-only recovery to bypass a hardware key enrolment. Require a second registered factor or an identity-verified admin override.
  4. Log all MFA events — enrolment, successful verification, failed attempts, recovery — with immutable audit trails.

What's Next

Episode 22 covers Single Sign-On, SAML, and Enterprise Identity — how law firms centralise authentication across dozens of SaaS platforms and what security guarantees SSO actually provides (and which it does not).

Sources & Further Reading

Sources & references

  1. OWASP, Multifactor Authentication Cheat Sheet (citing Microsoft analysis: MFA blocks 99.9% of automated account compromises).
  2. OWASP, Authentication Cheat Sheet — Multi-Factor Authentication.
  3. NIST, SP 800-63B: Digital Identity Guidelines — Authentication and Lifecycle Management, Sections 4.2 (AAL2) and 4.3 (AAL3).
  4. NIST, SP 800-63B Section 5.1.3.3 — restricted status for SMS-based authenticators.
  5. IETF, RFC 6238: TOTP: Time-Based One-Time Password Algorithm.
  6. Evilginx / real-time phishing proxy — documented in OWASP Testing Guide, Testing Multi-Factor Authentication.
  7. UpGuard, What Caused the Uber Data Breach in 2022?.
  8. Microsoft, Number matching in multifactor authentication; Duo and Okta adopted similar defaults post-2022.
  9. W3C, Web Authentication: An API for accessing Public Key Credentials.
  10. Token2, Why FIDO2 Is More Secure Than TOTP.
  11. FIDO Alliance, Passkeys — FIDO Alliance Specifications.
  12. CISA / IDManagement.gov, Phishing-Resistant Authenticator Playbook.
  13. OWASP, Multifactor Authentication Cheat Sheet — Factor Update Security.
  14. Wikipedia, Colonial Pipeline Ransomware Attack — VPN account with no MFA enabled.
  15. BleepingComputer, MGM Resorts Shuts Down IT Systems After Cyberattack (September 2023).
  16. ABA, 2023 Legal Technology Survey Report — MFA adoption rates across firm sizes.